Sciweavers

359 search results - page 33 / 72
» Using graph analysis to study networks of adaptive agent
Sort
View
ICICS
2005
Springer
14 years 1 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
CORR
2008
Springer
78views Education» more  CORR 2008»
13 years 7 months ago
Distributed Beamforming with Feedback: Convergence Analysis
The focus of this work is on the analysis of transmit beamforming schemes with a low-rate feedback link in wireless sensor/relay networks, where nodes in the network need to imple...
Che Lin, Venugopal V. Veeravalli, Sean P. Meyn
TELSYS
2010
121views more  TELSYS 2010»
13 years 2 months ago
Packet level performance analysis of a packet scheduler exploiting multiuser diversity
In this paper, we consider a packet scheduler exploiting multiuser diversity in a wireless network with AMC (Adaptive Modulation and Coding), and propose a packet level performance...
Gang Uk Hwang, Fumio Ishizaki
CSE
2009
IEEE
14 years 2 months ago
First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL
—Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often i...
Elizabeth M. Bonsignore, Cody Dunne, Dana Rotman, ...
CDC
2010
IEEE
100views Control Systems» more  CDC 2010»
13 years 2 months ago
A resistance-based approach to consensus algorithm performance analysis
Abstract-We study the well known linear consensus algorithm by means of a LQ-type performance cost. We want to understand how the communication topology influences this algorithm. ...
Federica Garin, Enrico Lovisari, Sandro Zampieri